Recent

Key TakeawaysNew macOS Stealer: Reaper targets Apple users by spoofing major tech brands, including Apple, Microsoft, and Google, to steal credentials.Sophisticated Evasion Tactics: The malware…

|
Published

Key TakeawaysMassive data breach: Hackers compromised the records of at least 1.8 million individuals.Extended unauthorized access: Attackers accessed the network from November 2025 to February…

|
Published

Key TakeawaysOperational Disruption: Law enforcement apprehended over 200 individuals and decommissioned more than 50 malicious servers.Victimology and Suspect Profiles: The 13-nation operation identified almost 4,000…

|
Published

Key TakeawaysAttack volume drops: Total mobile attacks decreased, but unique user targeting remained stable.Banking Trojans surge: Malicious installation packages increased by half quarter-over-quarter.Emerging mobile threats:…

|
Published

Key TakeawaysRapid cloning: The first Shai-Hulud worm clones appeared days after TeamPCP released the source code.Malicious packages: Security researchers identified four malicious NPM packages with…

|
Published

Key TakeawaysIRGC propaganda: A law enforcement operation identified and disrupted the IRGC's online presence used to spread propaganda, recruit supporters, and raise funds.Operation span: The…

|
Published

Key TakeawaysConfirmed token compromise: Grafana officially disclosed that an unauthorized party accessed its GitHub environment.Codebase extortion attempt: The unnamed threat actors successfully downloaded the company's…

|
Published

Manny Ataebi – Cerby Manny Ataebi has been appointed as Chief Marketing Officer at identity security company Cerby after spending the last three years in…

|
Published

The week’s incidents show cybercrime becoming faster and quieter, with supply chain attacks targeting developer ecosystems because compromising one package can spread malware to thousands…

|
Published on May 16, 2026
Windscribe Response to Canada Bill C-22 Surveillance Law

Key TakeawaysCanada Bill C-22 surveillance law: Windscribe may exit Canada if forced to log user metadata for compliance.Industry reaction: Signal and Windscribe oppose bill, citing…

|
Published on May 16, 2026
Utah Age Verification Law Targets VPN Bypass Liability

Key TakeawaysUtah age verification VPN liability law: Websites held responsible when users bypass age checks using VPN location masking.Enforcement difficulty: VPN detection remains unreliable, as…

|
Published on May 16, 2026
Android 16 VPN Bug Can Leak Users’ Real IP Addresses, Researcher Claims

Key TakeawaysAndroid 16 VPN vulnerability: Researchers claim apps can bypass VPN tunnels and expose users’ real IP addresses.Google response: Google reportedly marked the Android 16…

|
Published on May 16, 2026

Key TakeawaysIndictment returned: A federal grand jury charged two Pakistani men and one Indian man in relation to dark web narcotics trafficking.Dark web operations: Defendants…

|
Published on May 15, 2026

Key TakeawaysTargeted Phishing Attack: Russian hackers targeted over 13,500 Signal users in an extensive espionage operation.Automated Compromise System: The ApocalypseZ infrastructure facilitated bulk account hijacking…

|
Published on May 15, 2026

Key TakeawaysTargeted sectors: Operations focused on South Korean entities, alongside defense targets in Brazil and Germany.Malware variants: Threat actors deployed HelloDoor, httpMalice, MemLoad, httpTroy, AppleSeed,…

|
Published on May 15, 2026

Key TakeawaysNew campaign: ESET researchers have identified Ghostwriter conducting targeted operations against Ukrainian governmental entities.Malicious payload delivery: Threat actors deployed PicassoLoader and a Cobalt Strike…

|
Published on May 15, 2026
OpenAI Logo

Key TakeawaysData security: OpenAI states that there is no evidence that user data or intellectual property was accessed.Impacted devices: Two corporate employee devices were affected…

|
Published on May 14, 2026

Key TakeawaysGlobal scope: Iran-linked APT MuddyWater hit almost 10 organizations across four continents in Q1 2026, among which is an unnamed electronics maker.DLL sideloading: The…

|
Published on May 14, 2026

Key TakeawaysUnverified breach claims: TeamPCP alleges the successful extraction and sale of Mistral AI and Mistral Solutions corporate data.Data volume reported: The threat actor claims…

|
Published on May 14, 2026
Iran internet blackout women impact online livelihood hit!!!

Key TakeawaysIran internet blackout women: collapse of online livelihoods across Iran: Internet shutdowns cripple women-led businesses, eliminating income from online platforms and informal digital work…

|
Published on May 14, 2026
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: